Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
University of California, Irvine
Skills you'll gain: Swift Programming, Objective-C (Programming Language), iOS Development, Core Data (Software), Apple iOS, Apple Xcode, Model View Controller, JSON, User Interface (UI) Design, UI Components, User Interface and User Experience (UI/UX) Design, OAuth, Responsive Web Design, Prototyping, Human Computer Interaction, UI/UX Strategy, Usability Testing, Authentications, Data Mapping, Mobile Development
University of Illinois Urbana-Champaign
Skills you'll gain: Investments, Finance, Portfolio Management, Business Valuation, Financial Modeling, Financial Market, Equities, Return On Investment, Financial Analysis, Corporate Finance, Microsoft Excel, Regression Analysis, Risk Analysis, Performance Analysis, Cash Flows
LearnQuest
Skills you'll gain: Data Ethics, Predictive Modeling, OpenAI, Algorithms, Data Collection, Machine Learning, Predictive Analytics, Artificial Intelligence, Information Privacy, Game Theory, Ethical Standards And Conduct, Personally Identifiable Information, Statistical Modeling, Machine Learning Algorithms, Analytical Skills, Data Integrity, Artificial Intelligence and Machine Learning (AI/ML), Analysis, Data Security, Diversity Awareness
Microsoft
Skills you'll gain: Stakeholder Management, Business Analysis, Project Management, Analysis, Business Requirements, Risk Management, Microsoft Power Platform, Requirements Analysis, Problem Management
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Skills you'll gain: Kubernetes, Cloud-Native Computing, Google Cloud Platform, Application Deployment, Scalability, Load Balancing, Cloud Infrastructure, Containerization, Cloud Computing, YAML, Data Storage, Authorization (Computing), General Networking, Network Security
Skills you'll gain: Virtualization, Unix, IBM DB2, IBM Cloud, Data Management, Virtual Machines, Database Management Systems, Data Storage, Infrastructure Architecture, System Programming, Operating Systems, Unix Commands, IT Infrastructure, File Systems, System Monitoring, Computer Architecture, Servers, Control Panels, Command-Line Interface, Computing Platforms
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Network Security, Malware Protection, Cybersecurity, Cloud Computing, Mobile Security, Application Security, Cyber Attacks, Cyber Security Assessment, Security Testing, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Virtualization, Firewall, Vulnerability Assessments, Threat Modeling
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
Skills you'll gain: OSI Models, Vulnerability Scanning, Penetration Testing, TCP/IP, General Networking, Network Security, Network Protocols, Network Monitoring, Cyber Security Assessment, Network Administration, Vulnerability Assessments, Computer Networking, Network Analysis, Firewall, Scripting, Performance Tuning, System Configuration, Software Installation
Skills you'll gain: Network Troubleshooting, Hardware Troubleshooting, Command-Line Interface, Desktop Support, Operating Systems, Network Administration, System Support, System Configuration, Computer Hardware, Network Security, Microsoft Windows, Technical Support and Services, General Networking, Technical Support, Mac OS, Linux, Mobile Security, Infrastructure Security, Computer Displays, Firewall
In summary, here are 10 of our most popular breach (security exploit) courses
- iOS Development for Creative Entrepreneurs:Â University of California, Irvine
- Investments I: Fundamentals of Performance Evaluation:Â University of Illinois Urbana-Champaign
- Ethics in the Age of AI:Â LearnQuest
- Business Analysis Fundamentals:Â Microsoft
- Principles of Secure Coding:Â University of California, Davis
- Architecting with Google Kubernetes Engine: Workloads:Â Google Cloud
- IBM z/OS Mainframe Practitioner:Â IBM
- Secure Software Design:Â University of Colorado System
- Certified Ethical Hacking (v12):Â LearnKartS
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University